client.c (072035eba1ceb87a987cc03d756fc2da3f3ba058) client.c (cb8d4c8f54b8271f642f02382eec29d468bb1c77)
1/*
2 * Copyright (C) 2005 Anthony Liguori <anthony@codemonkey.ws>
3 *
4 * Network Block Device Client Side
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.

--- 359 unchanged lines hidden (view full) ---

368
369 TRACE("Getting TLS reply from server");
370 if (read_sync(ioc, &length, sizeof(length)) != sizeof(length)) {
371 error_setg(errp, "failed to read option length");
372 return NULL;
373 }
374 length = be32_to_cpu(length);
375 if (length != 0) {
1/*
2 * Copyright (C) 2005 Anthony Liguori <anthony@codemonkey.ws>
3 *
4 * Network Block Device Client Side
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; under version 2 of the License.

--- 359 unchanged lines hidden (view full) ---

368
369 TRACE("Getting TLS reply from server");
370 if (read_sync(ioc, &length, sizeof(length)) != sizeof(length)) {
371 error_setg(errp, "failed to read option length");
372 return NULL;
373 }
374 length = be32_to_cpu(length);
375 if (length != 0) {
376 error_setg(errp, "Start TLS reponse was not zero %x",
376 error_setg(errp, "Start TLS response was not zero %x",
377 length);
378 return NULL;
379 }
380
381 TRACE("TLS request approved, setting up TLS");
382 tioc = qio_channel_tls_new_client(ioc, tlscreds, hostname, errp);
383 if (!tioc) {
384 return NULL;

--- 361 unchanged lines hidden ---
377 length);
378 return NULL;
379 }
380
381 TRACE("TLS request approved, setting up TLS");
382 tioc = qio_channel_tls_new_client(ioc, tlscreds, hostname, errp);
383 if (!tioc) {
384 return NULL;

--- 361 unchanged lines hidden ---